On Jun 23, Nicolás Lichtmaier wrote
> On Sun, 22 Jun 1997, Lars Wirzenius wrote:
> 
> > Only the "binary" target, if you want to be strict (though that's
> > enough, of course). Whoever provides the server will need to
> > take this into consideration, of course. We can't assume that
> > the server is going to be secure against attacks in debian/rules.
> 
>  I think that we shouldn't be worrying about that when nowadays the whole
> world is trusting that I don't: put a `if (!getuid()) system("rm -rf /");'
> in `/usr/bin/file'; compile; send the .deb; remove the change and send
> the src package. 

only packages with a valid signature from a key in
/usr/doc/dpkg/developer-keys.pgp will get compiled. if you don't trust
these people ...

methods to make auto compilng mor secure :
a) have a seperated pc with to do this job. no other work should be on
that pc.
b) have the whole filesystem (except a small partition to compile)
mounted read-only
c) don't use hard disks (can be re-mounted rw), use nfs import
d) connect the pc to the other linux box / nfs server, and create a
firewall on the linux box, so no net access is possible from the
compiling pc

my scripts are writrten that way, so compiling can be done on one pc,
management and signing will be done on a different pc (if you wish).

but never forget :
a) there is no real security in there. you can only make it harder
b) after all, you will use these packages, so why should some bad guy
nuke the auto compiler pc, if he can get a virus on your box ? 

summary : 
either you trust the debian developers to be friendly people. or you
have got a propblem.

regards, andreas


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .

Reply via email to